HowToGetSoftwareJob

HowToGetSoftwareJob
HowToGetSoftwareJob Google Hangout

Thursday, 12 April 2012

what is '1000 projects'?

'fullinterview.com' is a educational content website dedicated to finding and realizing final year projects for btech, be, mtech, mca students, here you can search, find your projects and get guidance from experts the below are the different technological projects.
visual Studio projects .net projects, asp projects, c & ds projects, c++ projects (all), cold fusion projects, delphi projects, java projects, perl projects, php projects, sql projects, vc++ projects, visual basic projects.

how it works?

well, everything on this site is submitted by the student and professional community. after you submit your project, it is being verified and approved by our administrator. after approval, other people can read/discuss it, save to favorites.

more number of projects?

here you can find morethan 1000 projects on different technologies, if u want to get more projects please visit our sister sites www.fullinterview.com & Chetanasprojects.com
Category Articles
Which is the program which determines whether a transaction should be restarted ?
Added on Fri, Nov 27, 2009
What is EXEC CICS RETRIEVE ?
Added on Wed, Nov 25, 2009
Used by STARTed tasks to get the parameters passed to them. Read More
How do you protect a field from being overlaid?What is the attribute byte?
Added on Thu, Nov 26, 2009
Defines the display/transmission of field most cases is an output field from the program Read More
When you get the Map-fail condition? What is the abend code of it?
Added on Fri, Nov 27, 2009
This occurs if the data to be mapped has the length of zero, or contains no SBA code. This usually happens when the user presses the ENTER key with out typing data if no FSET is specified in DFHMDF macros. Read More
What is the difference between the Attention Identifier & Handle aid commands?How they are coded in the CICS Program?
Added on Fri, Nov 27, 2009
AID indicates which method the terminal operator has used to initiate the transfer of information from the terminal device to CICS. Some examples of AID are PF keys, Enter key and Clear key EIBAID field in EIB contains the AID code of the most... Read More
How do you delete Item 3 in a five-item TSQ ?
Added on Thu, Nov 26, 2009
You can’t--at least not directly. Options, none of them good, include: 1) adding a logical-delete flag to the contents of each item; 2) moving item 4 to 3 and 5 to 4 and initializing item 5, all thru rewrites; this is a variant on 1; 3)... Read More
What is DTB ?
Added on Fri, Nov 27, 2009
Dynamic Transaction Back-out. A process to recover recoverable resources based on information stored in the Dynamic Log. DTB stands for Direct Table Based in mainframe, actually lanuge called DTB/COBOL Read More
What is BMS ?
Added on Thu, Nov 26, 2009
BMS is Basic Map Support; it allows you to code assembler level programs to define screens. Read More
What is the difference between a PF key & a PA key ?
Added on Fri, Nov 27, 2009
PF keys wake up the task and transmit modified data, PA keys only wake up the task Read More
Why is a TERM ID recommended in naming a TSQ?
Added on Thu, Nov 26, 2009
In order to avoid confusion and to maintain data security, a strict naming convention for QID will be required in the installation. Moreover, for a terminal-dependent task (e.g., pseudo-conversational task), the terminal id should be included in... Read More
What is the difference between using the READ command with INTO option and SET option?
Added on Thu, Nov 26, 2009
When we use INTO option with the READ command the data content of the record will be moved into the specified field defined in the Working Storage Section of the program. When we use SET option with the READcommand , CICS sets the address pointer to... Read More
What is the difference between CICS Program Control Table (PCT) and CICS Processing Program Table (PPT) ?
Added on Fri, Nov 27, 2009
PCT contains a list of valid transaction ID. Each transaction ID is paired with the name of the program ,CICS will load and execute when the transaction is invoked. On the other hand, PPT indicates each program’s location which pertains to a... Read More
How To Set MDT(Modified Data Tag) Thru Application Program?(Dynamically).
Added on Fri, Nov 27, 2009
You have to move the following macro DFHBMFSE to the Attribute field of that particular Variable. Read More
How a CICS Transaction be initiated?
Added on Wed, Nov 25, 2009
Involving CICS Control programs and Control tables. a. Trans-id entered in terminal b. TCP with TCT recognizes incoming data c. SCP acquires the storage for the Terminal Input-Output Area (TIOA) d. KCP prepares control data for this task e.KCP,... Read More
What is the difference between FSET and FRSET ?
Added on Thu, Nov 26, 2009
FSET specifies that the modified data tag should be turned on before the map is sent to the screen. FRSET turns off the attribute byte; it’s used to transmit only changed data from the terminal. Read More
How do you make your BMS maps case sensitive?
Added on Fri, Nov 27, 2009
Use ASIS. Read More
Explain the difference among the EXEC LINK, EXEC XCTL and Cobol II static call statements in CICS?
Added on Fri, Nov 27, 2009
COBOL II allows for static calls which are more efficient than the LINK instruction which establishes a new run- unit. Read More
CICS’ system services provides an interface between CICS and the operating system and carries out the functions like loading and releasing of application programs, acquiring and freeing of storage , task scheduling, etc (True or False). ?
Added on Fri, Nov 27, 2009
True Read More
In the conversational mode the system waits for the user to enter his response and then press an attention key, and while waiting the resources are held by the program or task. So conversational mode of programming is inefficient (True or False)?
Added on Fri, Nov 27, 2009
True Read More
What is the size of commarea?
Added on Wed, Nov 25, 2009
The default commarea size is 65k. Read More
What tables must be updated when adding a new transaction and program ?
Added on Thu, Nov 26, 2009
At a bare minimum the Program Control Table ( PCT) and Program Processing Table (PPT) must be updated. Read More
Specify CICS transaction initiation process. (From the perspective of CICS control programs and control tables.)?
Added on Thu, Nov 26, 2009
TCP places data in TIOA and corresponding entry into TCT. KCP acquires the transaction identifier from TIOA and verifies if it is present in PCT. SCP acquires Storage in Task Control Area (TCA), in which KCP prepares control data for the task. KCP... Read More
Into what fields will the date and time values be moved after execution of the above command?
Added on Thu, Nov 26, 2009
EIBDATE & EIBTIME. Read More
Mention the option used in the CICS READ command to gain accessibility directly to the file I/O area. (Assume COBOL-II). ?
Added on Thu, Nov 26, 2009
SET(ADDRESS OF LINKAGE-AREA). Read More
Code the related portions of CICS/COBOL-I programs to gain addressability to TWA area assigned to a particular task. Assume that the size of TWA area is 300 bytes. What are the advantages if COBOL-II is used in the place of COBOLCode the above requir
Added on Thu, Nov 26, 2009
COBOL- II PROGRAM LINKAGE SECTION. 01 PARMLIST. 02 FILLER PIC S9(8) COMP. 02 TWA-PTR S(98) COMP. 01 TWA-DATA-LAYOUT. 02 DATA-AREA PIC X(300). PROCEDURE DIVISION. ???. EXEC CICS ADDRESS TWA(TWA-PTR) END-EXEC SERVISE RELOAD TWA-DATA-LAYOUT. COBOL- II... Read More
What is the function of DFHMDF BMS macro?
Added on Thu, Nov 26, 2009
The DFHMDF macro defines fields, literal, and characteristics of a field. Read More
What is the meaning of BMS length of field = 0?
Added on Fri, Nov 27, 2009
Data was not entered in the field Read More
What do you do if you do not want characters entered by the user to be folded to uppercase ?
Added on Fri, Nov 27, 2009
Use ASIS option on RECEIVE Read More
What is the difference between the LINK, XCTL & CALL statements?
Added on Fri, Nov 27, 2009
XCTL passes control to another program, both programs are on the same logical level. When passed program execution ends, control is NOT passed back to main program. LINK passes control to another program, but when passed program ends, control will... Read More
For protecting a transaction using the transaction security function, the two things that must be done are?
Added on Fri, Nov 27, 2009
1. in the SNT entry of the user who you which to allow to access a protected transaction, specify SCTKEY=n 2. In the PCT entry of the transactions that you wish to protect specify the TRANSEC=n. (True or False) True Read More
What CICS command are used to read a VSAM KSDS sequentially in ascending order?
Added on Wed, Nov 25, 2009
First issue a STARTBR(start browse), which will position the browse at the desired record. Retrieve records by using subsequent READNEXT commands. Indicate the end of sequential processing with the ENDBR command. If the generic key is specified in... Read More
How can you accomplish breakpoint in intertest?
Added on Thu, Nov 26, 2009
U-for unconditional breakpoint, C-for conditional breakpoint, and A-for automatic breakpoint Read More
What are the CICS commands associated with transient data queue processing ?
Added on Thu, Nov 26, 2009
WRITEQ TD, READQ TD, DELETEQ TD, ENQ and DEQ. Read More
What is the CICS command that gives the length of TWA area?
Added on Thu, Nov 26, 2009
EXEC CICS ASSIGN TWALENG(data-value) END-EXEC. Read More
How do you set the MDT option to ?ON? status, even if data is not entered?
Added on Thu, Nov 26, 2009
Mention FSET option in DFHMDF or set it dynamically in the program using FIELD+A attribute field. Read More
How can you start a CICS transaction other than by keying the Transaction ID at the terminal?
Added on Thu, Nov 26, 2009
By coding an EXEC CICS START in the application program By coding the trans id and a trigger level on the DCT table By coding the trans id in the EXEC CICS RETURN command By associating an attention key with the Program Control Table By embedding the... Read More
What happens to resources supplied to a transaction when an XCTL command is executed?
Added on Thu, Nov 26, 2009
With an XCTL, the working storage and the procedure division of the program issuing the XCTL are released. The I/O areas, the GETMAIN areas, and the chained Linkage Section areas (Commarea from a higher level) remain. All existing locks and queues... Read More
What is the difference between the INTO and the SET option in the EXEC CICS RECEIVE MAP command?
Added on Thu, Nov 26, 2009
The INTO option moves the information in the TIOA into the reserved specified area, while the SET option simply returns the address of the TIOA to the specified BLL cell or ?address-of? a linkage-section. Read More
What is MDT?What are FSET, FRSET ?
Added on Fri, Nov 27, 2009
Modified Data Tag Bit in the attribute byte indicating modification of field on screen Happens on an input operation. FSET Sets MDT on to ensure field is transmitted Happens on an output operation FRSET Resets MDT Until this happens, field... Read More
Can you simply check if length = 0 for checking if a field was modified?
Added on Fri, Nov 27, 2009
not if ERASE EOF was used Read More
When you compile a CICS program, the (pre)compiler puts an extra chunk of code Where does it get included and that is it called? What is its length?
Added on Fri, Nov 27, 2009
DFHEIBLK, DFHCOMMAREA Read More
Explain the term ?MRO? (Multi Region Operation)?
Added on Fri, Nov 27, 2009
MRO is the mechanism by which different CICS address spaces with in the same CPU can communicate and share resources. Read More
Name some important fields in the EIB block ?
Added on Fri, Nov 27, 2009
EIBRESP, EIBCALEN, EIBRRCDE, EIBTASK, EIBDATE, EIBTIME. Read More
What is the difference between a Symbolic map and Physical map ?
Added on Fri, Nov 27, 2009
SYMBOLIC MAP IS USED BY USER AND PHYSICAL MAP IS USED BY SYSTEM Read More
How is the stopper byte different from an auto skip byte ?
Added on Fri, Nov 27, 2009
STOPPER command will stop after completing its field , whereas AUTOSKIP command Will skip to next unprotected field after completing its field. Read More
If you use the OPTIMIZE compiler option the size of the program can be reduced by 5 to 10%(True or False).?
Added on Fri, Nov 27, 2009
True Read More
What will happen, if an out-of-range or negative value is specified in the LENGTH option of the SEND command?
Added on Fri, Nov 27, 2009
The OUTRAGE condition will be set Read More
If no exception handling is provided in the program, what will happen ?
Added on Fri, Nov 27, 2009
CICS will take the default action specified for the condition Read More
How many exceptional condition can be given in a HANDLE CONDITION?
Added on Fri, Nov 27, 2009
Max. of 12 exceptional conditions can be given in a single HANDLE CONDITION. Read More
WHAT IS DFHEIBLK?
Added on Wed, Nov 25, 2009
DFHEIBLK is Execute Interface Block. It is placed in the linkage section automatically by CICS translator program. It must be the first entry in linkage section. CICS places values prior to giving control to the program and we can find almost any... Read More
What information can be obtained from the EIBRCODE?
Added on Wed, Nov 25, 2009
The EIBRCODE tells the application program if the last CICS command was executed successfully and, if not, why not. Read More
How many ways can we initiate a CICS Transaction? What are they?
Added on Wed, Nov 25, 2009
A. Keying in the Transaction-id at the terminal B. By coding an EXEC CICS START in the application program C. By coding the transaction id and trigger level in the DCT (Automatic Task Initiation) D. By coding the transaction id in the EXEC CICS... Read More
If EIBCALLEN =0 , then what will happen?
Added on Wed, Nov 25, 2009
No COMMAREA was sent by the calling program. Read More
How would you release control of the record in a READ for UPDATE?
Added on Wed, Nov 25, 2009
By issuing a REWRITE,DELETE, or UNLOCK command or by ending the task. Read More
The EIB field which gives the last CICS command executed is ?
Added on Wed, Nov 25, 2009
EIBRCODE Read More
What is the COMMAREA(communications area)?
Added on Wed, Nov 25, 2009
An area used to transfer data between different programs or between subsequent executions of the same program. Needs to be defined in the Linkage Section. 1 what happens internally when a trans Id is entered in the CICS region? 2 What are all the... Read More
Which of the following statements correctly describe the syntax of CICS command language?
Added on Wed, Nov 25, 2009
If an EXEC CICS command must be continued onto a second line a hyphen (-) must be coded in column 7 of the continued line. B). If an EXEC CICS command must be continued onto a second line an ’X’ must be coded in column 72 of each line to... Read More
What is the EIB (execute interface block) ?
Added on Wed, Nov 25, 2009
The execute interface block lets the program communicate with the execute interface program, which processes CICS commands. It contains terminal id, time of day and response codes. Read More
Which type of TDQ is read destructive?
Added on Wed, Nov 25, 2009
Intrapartition TDQ is read destructive. extra partition tdq is not read destructive. Read More
What is the function of the EXEC CICS HANDLE CONDITION command?
Added on Wed, Nov 25, 2009
To specify the paragraph or program label to which control is to be passed if the ?handle condition? occurs. Read More
What are the differences between Temporary Storage Queue (TSQ) and Transient Data Queue (TDQ).?
Added on Wed, Nov 25, 2009
Temporary Storage Queue names are dynamically defined in the application program, while TDQs must first be defined in the DCT (Destination Control Table). When a TDQ contains certain amount of records (Trigger level), a CICS transaction can be... Read More
Question : What is an AEY9 abend ?
Added on Wed, Nov 25, 2009
DB2/IDMS not up Read More
A CICS program ABENDS with an ASRA ABEND code. What is its meaning?
Added on Wed, Nov 25, 2009
A link was issued to a program whose name does not exist in the PPT (Program Processing Table). B) A program attempted to use a map that is not defined in the PCT (Program Control Table). C) A security violation has occurred. The operator is not... Read More
How can you accomplish breakpoint in intertest tool?
Added on Wed, Nov 25, 2009
U-for unconditional brake point, C-for conditional brake point, and A-for automatic brake point. Read More
What is the difference between LINK and XCTL ?
Added on Wed, Nov 25, 2009
The XCTL command passes control to another program, but the resources requested by the first program may still be allocated. A task does not end until a RETURN statement is executed. While in LINK command, program control resumes its instruction... Read More
What is the maximum number of exceptions that can be specified with a single HANDLE CONDITION command in CICS ?
Added on Wed, Nov 25, 2009
SIXTEEN (16) Read More
Which is the command that is used to dump the main storage areas related to a task?
Added on Wed, Nov 25, 2009
DUMP Read More
What is the CICS command that is used to copy a screen image of a terminal into another terminal?
Added on Wed, Nov 25, 2009
ISSUE COPY Read More
What is the difference between a RETURN with TRANSID and XCTL ?
Added on Wed, Nov 25, 2009
For example prog. A is issuing REUTRN with TRANSID to prog B. Prog A. is issuing XCTL to prog B. In RETURN with TRANSID the control goes to the CICS region and the user have to transfer the control to prog. B by pressing any of the AID KEYS. In XCTL... Read More
The READ command with INTO option will read the record specified into the data area specified (True or false).?
Added on Wed, Nov 25, 2009
False Read More
CICS Command level is ?
Added on Wed, Nov 25, 2009
Low level version of CICS macro level Read More
Name some of the common tables in CICS and their usage ?
Added on Wed, Nov 25, 2009
PCT Program Control Table - defines each transaction, containing a list of valid transaction identifiers (transid) where each transaction is paired with its matching program; PPT Program Processing Table - contains a list of valid program names and... Read More
Name some common CICS service programs and explain their usage.?
Added on Thu, Nov 26, 2009
Terminal Control, File Control, Task Control, Storage Control, etc. Each CICS services program controls the usage and status for its resource (file, terminal, etc) within the CICS region. Read More
What is meant by program reentrance ?
Added on Thu, Nov 26, 2009
A program is considered reentrant if more than one task can execute the code without interfering with the other tasks’ execution. Read More
What is Communication Area?
Added on Thu, Nov 26, 2009
Communication Area is used to pass data between the program or between the task. Read More
What is a transid and explain the system transid CEMT. ?
Added on Thu, Nov 26, 2009
Transid is a transaction identifier, a four character code used to invoke a CICS task. CEMT is the master terminal transaction that lets you display and change the status of resources - it is the primary CICS service transaction. Read More
What is the common work area (CWA) ?
Added on Thu, Nov 26, 2009
The common work area is a storage area that can be accessed by any task in a CICS system. Read More
How do you access storage outside your CICS program ?
Added on Thu, Nov 26, 2009
In COBOL storage was accessed via BLL cells using the SET option of ADDRESS commands. In COBOL II the special register, ADDRESS OF lets you reference the address of any Linkage Section field Read More
How does COBOL II and CICS release 1.7 provide for exceptional conditions and how does that differ from VS COBOL and earlier CICS releases ?
Added on Thu, Nov 26, 2009
VS COBOL used the HANDLE CONDITION command to name routines to pass program control when exceptional conditions were encountered. COBOL II and CICS release 1.7 introduced the RESP option on many CICS commands. Read More
How do you control cursor positioning ?
Added on Thu, Nov 26, 2009
It’s controlled by the CURSOR option of the SEND MAP command using a direct (0 through 1919) or symbolic value. Read More
How do you invoke other programs What are the pros and cons of each method. ?
Added on Thu, Nov 26, 2009
There are three ways: 1). use a COBOL II CALL statement to invoke a subprogram. This method is transparent to CICS, which sees only the one load module. 2). an EXEC LINK is similar to a call; it invokes a separate CICS program and ends with a RETURN... Read More
What CICS command would you use to read a VSAM KSDS sequentially in ascending order?
Added on Thu, Nov 26, 2009
First issue a STARTBR(start browse), which will position the browse at the desired record. Retrieve records by using subsequent READNEXT commands. Indicate the end of sequential processing with the ENDBR command. If the generic key is specified in... Read More
Explain the difference among the EXEC LINK, EXEC XCTL and Cobol II static call statements in CICS. ?
Added on Thu, Nov 26, 2009
COBOL II allows for static calls which are more efficient than the LINK instruction which establishes a new run-unit. Read More
What is an ASRA ?
Added on Thu, Nov 26, 2009
An ASRA is the CICS interrupt code, the equivalent of an MVS abend code. Read More
What is transient data ?
Added on Thu, Nov 26, 2009
Transient data provides CICS programs with a simple method for sequential processing, often used to produce output for 3270 printers. Read More
What are the two types of transient data queues ?
Added on Thu, Nov 26, 2009
They are intrapartition, which can only be accessed from within CICS and extrapartition, which are typically used to collect data online, but process it in a batch environment. Read More
Where are transient data sets defined to CICS ?
Added on Thu, Nov 26, 2009
They are defined in the destination control table (DCT). Read More
Name some commands used for CICS file browsing. ?
Added on Thu, Nov 26, 2009
STARTBR, READNEXT, READPREV, ENDBR and RESETBR. Read More
What is the meaning of the SYNCPOINT command ?
Added on Thu, Nov 26, 2009
SYNCPOINT without the ROLLBACK option makes all updates to protected resources permanent, with the ROLLBACK option it reverses all updates. Read More
What do the terms locality of reference and working set mean ?
Added on Thu, Nov 26, 2009
They refer to CICS efficiency techniques. Locality of reference requires that the application program should consistently reference instructions and data within a relatively small number of pages. The working set is the number of program pages... Read More
What is a cursor in CICS sql processing. ?
Added on Thu, Nov 26, 2009
A cursor is a pointer that identifies one row in a sql results table as the current row Read More
What are the DB2 steps required to migrate a CICS DB2 program from source code to load module ?
Added on Thu, Nov 26, 2009
A DB2 precompiler processes some sql statements and converts others. It creates a data base request module (DBRM) for the binding step. The bind process uses the DBRM to create an application plan, which specifies the techniques DB2 will use to... Read More
What is DCLGEN ?
Added on Thu, Nov 26, 2009
DCLGEN stands for declarations generator; it is a facility to generate DB2 sql data structures in COBOL or PL/I programs. Read More
Name some translator and compile options and explain their meaning. ?
Added on Thu, Nov 26, 2009
For translator SOURCE option prints the program listing, DEBUG enables EDF and COBOL2 alerts the system to use the COBOL II compiler. For the compiler XREF prints a sorted data cross reference and FDUMP prints a formatted dump if the program abends. Read More
What is CEDF ?
Added on Thu, Nov 26, 2009
CEDF is the execute diagnostic facility that can be used for debugging CICS program Read More
What is a logical message in CICS ?
Added on Thu, Nov 26, 2009
A logical message is a single unit of output created by SEND TEXT or SEND MAP commands. BMS collects the separate output from each command and treats them as one entity. This technique may be used to build CICS reports. Read More
what is the meaning of the ENQ and DEQ commands ?
Added on Thu, Nov 26, 2009
Neither command is exclusively a transient data command. The ENQ command reserves any user defined resource for the specific task. For enqueued transient data no other task will be able to write records to it for as long as it is enqueued. DEQ... Read More
How do you get data from a task that began with a START command ?
Added on Thu, Nov 26, 2009
The RETRIEVE command is used to get data from a task that began with a START command. Read More
What is interval control and what are some of the CICS commands associated with it ?
Added on Thu, Nov 26, 2009
CICS interval control provides a variety of time-related features - common commands are ASKTIME, FORMATTIME, START, RETRIEVE, and CANCEL. Read More
What are the commands used to gain exclusive control over a resource (for Ex a Temporary storage queue.)?
Added on Thu, Nov 26, 2009
EXEC CICS ENQ EXEC CICS DEQ RESOURCE(QID) RESOURCE(QID) END-EXEC END-EXEC Read More
How do you initiate another transaction.The transaction initiated should be in a position to retrieve information pertaining to which transaction has initiated it and from which terminal. (Code the required CICS commands)?
Added on Thu, Nov 26, 2009
EXEC CICS START INTERVAL(hhmmss)/TIME(hhmmss) TRANSID(?TRAN?) TERMID(?TRM1) FROM(data-area) LENGTH(data-value) RTRANSID(EIBTRNID) RTERMID(EIBTRMID) END-EXEC EXEC CICS RETRIEVE INTO(data-area) LENGTH(data-value) RTRANSID(data-name) RTERMID(data-name)... Read More
Mention the option (along with argument type) used in a CICS command to retrieve the response code after execution of the command. ?
Added on Thu, Nov 26, 2009
RESP( S9(8) COM.) Read More
What?s the CICS command used to access current date and time?
Added on Thu, Nov 26, 2009
ASKTIME. Read More
ow to terminate an already issued DELAY command?
Added on Thu, Nov 26, 2009
EXEC CICS CANCEL REQID(id) END-EXEC Read More
How do you dynamically set the CURSOR position to a specific field?
Added on Thu, Nov 26, 2009
MOVE ?1 to FIELD+L field. Mention CURSOR option in the SEND command. Read More
Which option of the PCT entry is used to specify the PF key to be pressed for initiating a transaction?
Added on Thu, Nov 26, 2009
TASKREQ=PF1 Read More
Which command is used to release a record on which exclusive control is gained?
Added on Thu, Nov 26, 2009
EXEC CICS UNLOCK END-EXEC. Read More
What is the option specified in the read operation to gain multiple concurrent operations on the same dataset?
Added on Thu, Nov 26, 2009
REQID(value). Read More
What are the attribute values of Skipper and Stopper fields?
Added on Thu, Nov 26, 2009
ASKIP, PROT. Read More
What option is specified in the SEND command to send only the unnamed fields on to the screen?
Added on Thu, Nov 26, 2009
MAPONLY Read More
What is the most common way of building queue-id of a TSQ (Name the constituents of the Queue ID)?
Added on Thu, Nov 26, 2009
TERMID+TRANSACTION-ID. Read More
Into which table is the terminal id registered?
Added on Thu, Nov 26, 2009
TCT. Read More
How and where is the TWA size set?
Added on Thu, Nov 26, 2009
TWASIZE=300 in PCT table. Read More
Which transient data queue supports ATI?
Added on Thu, Nov 26, 2009
INTRA- PARTITION Data queue. Read More
What does ?Pseudo Conversational? mean?
Added on Thu, Nov 26, 2009
The programming technique in which the task will not wait for the end-user replies on the terminal. Terminating the task every time the application needs a response from the user and specifying the next transaction to be started when the end user... Read More
What is the function of the CICS translator?
Added on Thu, Nov 26, 2009
The CICS translator converts the EXEC CICS commands into call statements for a specific programming language. There are CICS translators for Assembler, COBOL, and PL/1. Read More
What is a resident program?
Added on Thu, Nov 26, 2009
A program or map loaded into the CICS nucleus so that it is kept permanently in main storage and not deleted when CICS goes ?Short On Storage?. Read More
How many conditions can you include in a single HANDLE CONDITION command?
Added on Thu, Nov 26, 2009
No more than 16 in a single handle condition. If you need more, then you must code another HANDLE CONDITION command. Read More
What is the EXEC CICS HANDLE ABEND?
Added on Thu, Nov 26, 2009
It allows the establishing of an exit so cleanup processing can be done in the event of abnormal task termination.Mainly it is used for to prevent loop in exceptional condition . Read More
What is the difference between EXEC CICS HANDLE CONDTION and an EXEC CICS IGNORE command?
Added on Thu, Nov 26, 2009
A HANDLE CONDITION command creates a ?go-to? environment. An IGNORE command does not create a go-to environment; instead, it gives control back to the next sequential instruction following the command causing the condition. They are opposites. Read More
What are the CICS commands available for program control?
Added on Thu, Nov 26, 2009
The following commands are available for the Program Control services: LINK: To pass control to another program at the lower level, expecting to be returned. XCTL: To pass control to another program at the same level, not expecting to be returned.... Read More
Can we define an alternate index on VSAM/RRDS ?
Added on Thu, Nov 26, 2009
How to establish dynamic cursor position on a map?
Added on Thu, Nov 26, 2009
We dynamically position a cursor through an application program using a symbolic name of the symbolic map by placing -1 into the field length field ( i.e., fieldname + L) of the field where you wish to place thecursor. The SEND MAP command to be... Read More
How do you place the cursor on a particular position on the screen?
Added on Thu, Nov 26, 2009
Move -1 to the length attribute of the field and use the CURSOR option. Read More
What are the two outputs created as a result of generation of a map?
Added on Thu, Nov 26, 2009
The map copybook and the load module. Two Outputs are generated from generation of map, one is Physical Map that is load module of the given Map, and another one is Symbolic Map that is copybook and used in the application... Read More
What is a mapset?
Added on Thu, Nov 26, 2009
A mapset is a collection of BMS maps link-edited together. Read More
What is the difference between physical map and symbolic map?
Added on Thu, Nov 26, 2009
The physical map is the load module and the symbolic map is the data structure Read More
How do you use extended attributes ?
Added on Thu, Nov 26, 2009
Define EXTATT=YES and the correct terminal type. Read More
What are the 3 working storage fields used for every field on the map?
Added on Thu, Nov 26, 2009
Length, attribute and input/output field Read More
What is the use of DSECT parameter in BMS?
Added on Thu, Nov 26, 2009
is the parameter to generate a symbolic map Read More
Do you receive the attribute byte in the symbolic map?
Added on Thu, Nov 26, 2009
On EOF yes Read More
How can the fact that EIBCALEN is equal to zeros be of use to an application programmer?
Added on Fri, Nov 27, 2009
When working in a pseudo-conversational mode, EIBCALEN can be checked if it is equal to zero. A programmer can use this condition as a way of determining first time usage(of the program). Read More
Which CICS system program is responsible for handling automatic task initialization?
Added on Fri, Nov 27, 2009
The Transient Data Program(TDP). Read More
What are SEND MAP options?
Added on Fri, Nov 27, 2009
SENDMAPONLY & SEND MAP DATAONLY Read More
In an on-line environment, how can you prevent more than one user from accessing the same Transient Data Queue at the same time?
Added on Fri, Nov 27, 2009
By issuing an EXEC CICS ENQ against the resource. When processing is completed, a DEQ should be executed. Read More
The DFHCOMMAREA is used to pass information from one application to another. What are some other ways that this function can be accomplished?
Added on Fri, Nov 27, 2009
You can also pass information in the following ways. - By using a temporary storage queue - By using an intrapartition TDQ - By using the Task Work Area - By using TCTUA - Through a file Read More
Can you define multiple maps in a BMS mapset?
Added on Fri, Nov 27, 2009
Which CICS command must be issued by the application program in order to gain access to the Common Work Area(CWA)?
Added on Fri, Nov 27, 2009
EXEC CICS ADDRESS with CWA option Read More
In which CICS table would you specify the length of the TASK WORK AREA (TWA)?
Added on Fri, Nov 27, 2009
In the Program Control Table(PCT). Read More
What does the BUFFER option in RECEIVE mean ?
Added on Fri, Nov 27, 2009
Bring the entire datastream from the terminal buffer Read More
What is a deadlock?
Added on Fri, Nov 27, 2009
Deadlock (also known as a ?deadly embrace?) occurs when a task is waiting for a resource held by another task which, in turn, is waiting for a resources held by the first task. Read More
Explain the term Transaction routing?
Added on Fri, Nov 27, 2009
Transaction routing is a CICS mode of intercommunication which allows a terminal connected to local CICS to execute another transaction owned by a remote CICS. Read More
In which table would you make an entry for a BMS map?
Added on Fri, Nov 27, 2009
What is multitasking and multithreading?
Added on Fri, Nov 27, 2009
Multitasking is the feature supported by the operating system to execute more than one task simultaneously. Multithreading is the system environment where the tasks are sharing the same programs load module under themultitasking environment. It is... Read More
What is the difference between link xctl?
Added on Fri, Nov 27, 2009
Link is temporary transfer of control. Xctl is permanent transfer of control Read More
For a CICS-DB2 program, how is the plan referenced?
Added on Fri, Nov 27, 2009
Uses a RCT table Read More
Name some of the common tables in CICS and their usage?
Added on Fri, Nov 27, 2009
PCT Program Control Table - defines each transaction, containing a list of valid transaction identifiers (transid) where each transaction is paired with its matching program PPT Program Processing Table - contains a list of valid program names and... Read More
What is BMS?
Added on Fri, Nov 27, 2009
BMS is Basic Map Support; it allows you to code assembler level programs to define screens. Read More
Can you use DYNAMIC calls in CICS ?
Added on Fri, Nov 27, 2009
Yes, the called routine must be defined in PPT and the calling program must use CALL identifier. Read More
Are sequential files supported by CICS?
Added on Fri, Nov 27, 2009
Yes, but not as part of the File Control Program. They are supported as extra partition transient data files. Read More
What is the meaning of the SYNCPOINT command?
Added on Fri, Nov 27, 2009
SYNCPOINT without the ROLLBACK option makes all updates to protected resources permanent, with the ROLLBACK option it reverses all updates. Read More
Suppose pgm A passes 30 bytes to pgm B thru commarea and pgm B has defined its DFHCOMMAREA to be 50 bytes Is there a problem
Added on Fri, Nov 27, 2009
Yes, if B tries to access bytes 31-50 Read More
How to build up LU 6.2 communication" and "what Pseudo-conversational and real conversational transaction are and their differences." ?
Added on Fri, Nov 27, 2009
Pseudo-conversational transactions are almost always the preferred method. In these mode CICS releases resources between responses to user input, i.e. the task is ended awaiting the user response. Read More
Why must all CICS programs have a Linkage Section ?
Added on Fri, Nov 27, 2009
To pass parameters from appl. Program to CICS. Read More
What is MDT? In how many ways it can be Set or Reset?
Added on Fri, Nov 27, 2009
83.What is MDT? In how many ways it can be Set or Reset? MDT is the last bit in every byte. Modified Data Tag is a 1 bit attribute character of a BMS field. When it is set on ? CICS will transmit the data contained in the associated map field... Read More
What are the Skipper & Stopper fields?
Added on Fri, Nov 27, 2009
It is good practice to always skip the cursor to the next unprotected field after one unprotected field. Skipper is an unlabeled 1 byte field with the auto-skip attribute. DFHMDF POS=(XX,XX),ATTRB=ASKIP,LENGTH=1 For some important unprotected field... Read More
Can a program change protected field ?
Added on Fri, Nov 27, 2009
How will you place cursor on a field called ?EMPNO?. This field belongs to mapset ?MAPEMPG? and map ?MAPEMPM? and Symbolic map ?Empid-Rec?
Added on Fri, Nov 27, 2009
BY INSERTING IC IN THE ATTRIB COMMAND Read More
What are the CICS supplied standard transactions and what for they are used?
Added on Fri, Nov 27, 2009
EDF: Execution Diagnostic Facility ? Monitors the execution of an application program as an interactive debugging aid. ? CEDF CECI: Command Level Interpreter ? Performs syntax checking of a CICS command. If the syntax is satisfied, it will actually... Read More
What is the difference between the MRO & ISC?
Added on Fri, Nov 27, 2009
MRO: Multi-Region Operation. MRO is the mechanism by which different CICS address spaces with in the same CPU can communicate and share resources. MRO is communication between a CICS system and other CICS system in the same processor. ISC:... Read More
Before issuing an ASKTIME command what will be the values in the EIBDATE and EIBTIME fields if the EIB?
Added on Fri, Nov 27, 2009
The date and time at the task initiation Read More
What is the error condition that is set when the file specified in the NAME option is not in the FCT?
Added on Fri, Nov 27, 2009
PGMIDERR Read More
Difference between START & XCTL
Added on Fri, Nov 27, 2009
START command is used to start a transaction at the specified terminal and at specified time or interval. Optionally data can be passed to the to-be-initiated transaction. EXEC CICS START TRANSID(?REP1?) TERMID(?PRT1) TIME(083000) ?R INTERVAL(001500... Read More
What are the parameters that you have to give when you are using the CSSN transaction?
Added on Fri, Nov 27, 2009
None OPNAME N PASSWORD defined in SNT must be provided for the transaction. Read More
NMDS is both device dependent and format dependent (True or False)?
Added on Fri, Nov 27, 2009
True Read More
Reading a record from a TSQ will logically delete the record from the Queue (True or False).?
Added on Fri, Nov 27, 2009
True False Read More
what are the differences between DFHCOMMAREA and TSQ ?
Added on Fri, Nov 27, 2009
Both are used to save data among tasks. But commarea is private to that transaction only, like every transaction has its own commarea created by cics as soon as the transaction is initiated . However TSQ , if QID is known, can be accessed by other... Read More
What is the command that is used to delay the processing of a task for a specified time interval or until a specified time?
Added on Fri, Nov 27, 2009
WAIT WE :CAN USE TWO COMMANDS 1- DELAY 2- POST AND WAIT EVENT COMMANDS Read More
What is the option that is used to erase all unprotected fields during a SEND MAP operation?
Added on Fri, Nov 27, 2009
ERASEAUP Read More
How many ways are there for initiating a transaction?what are they?
Added on Fri, Nov 27, 2009
There are six ways in initiating a transaction.they are as follows.1. embedding four character transid on the top left most corner of the screen.2. making use of EXEC CICS START TRANSID ( )3. making use of EXEC CICS RETURN TRANSID ( ) 4. By defining... Read More
What is ASRA ABEND in CICS?
Added on Fri, Nov 27, 2009
It occurs when program interuption takes place.e.g.: when alphanumeric string moved to numeric data item OR when arithmetic calculations performed on nonnumeric data item OR when an attempt made to read an occurance of a table beyond the defined... Read More
Which is the macro used for making an entry in the PPT ?
Added on Fri, Nov 27, 2009
DFHPPT Read More
What is the primary objective of CICS ?
Added on Fri, Nov 27, 2009
To provide the control and services of the DB/DC system Read More
What is ENQ in CICS?
Added on Fri, Nov 27, 2009
If any one want to restrict Trans-Id to single user, enter trans-id with ENQ. It won’t allow any one else to use the same trans-id. Read More
In SYMBOLIC Cursor Positioning after moving -1 to the length field also the cursor is not positioned in that particular field. Give reasons?
Added on Fri, Nov 27, 2009
You have to explicitly specify the word CURSOR between your EXEC CICS and END-EXEC in the program. Read More
What command do you issue to delete a record in a transient data queue ?
Added on Fri, Nov 27, 2009
READQ TD, the read is destructive. Yes it is correct but there is a restriction.U can delete the records sequentially.. For example if one want to delete 10 th record directly it is not possible with this. Read More
What are the 3 common ways to create maps?
Added on Fri, Nov 27, 2009
The first way is to code a physical map and then code a matching symbolic map in your COBOL program. The second way to create a physical map along with a matching symbolic map is to code only the physical map using the &SYSPARM option, CICS will... Read More
Which is the command used for terminating a browse operation?
Added on Fri, Nov 27, 2009
ENDBR Read More
What is the difference between a physical BMS mapset and a logical BMS mapset?
Added on Fri, Nov 27, 2009
The physical mapset is a load module used to map the data to the screen at execution time. The symbolic map is the actual copybook member used in the program to reference the input and output fields on the screen. Read More
What is the primary function of the Processing Program Table (PPT)?
Added on Fri, Nov 27, 2009
To register all programs and maps Read More
Sync points cannot be requested by the application programs(True or False).?
Added on Sat, Nov 28, 2009
False Read More
The error code AEIV?
Added on Wed, Nov 25, 2009
This is the error code for length, if length of the source data is more than the receiving field, This error will occur. Read More
What are different ways of Initiating Transaction in CICS?
Added on Wed, Nov 25, 2009
We can initiate CICS Transaction By giving TRANSACTION ID By giving CICS START Command AUTOMATIC TASK INITIATION( ATI). Read More
What is the COMMAREA(communications area) ?
Added on Wed, Nov 25, 2009
This is the area of main storage designed to let programs or tasks communicate with one another, used in programs via RETURN, XCTL and LINK commands. Read More
What will be the length of the eibcalen ,if the transaction is used to cics first time?
Added on Wed, Nov 25, 2009
The length will be 0(zero). Read More
What CICS facilities can you use to save data between the transactions?
Added on Wed, Nov 25, 2009
COMMONAREA, TSQ & TDQ. Read More
Are sequential files supported by CICS ?
Added on Wed, Nov 25, 2009
Yes, but not as part of the File Control Program. They are supported as extra partition transient data files. Read More
What do the keywords MAPONLY and DATAONLY mean ?
Added on Wed, Nov 25, 2009
MAPONLY is a SEND MAP operand that sends only fields with initial values to the screen. DATAONLY is the SEND MAP operand that specifies only data from the map area should be displayed. Read More
What happens when a CICS command contains the NOHANDLE option?
Added on Wed, Nov 25, 2009
No action is going to be taken for any exceptional conditional occurring during the execution of this command. The abnormal condition that occurred will be ignored even if an EXEC CICS HANDLE condition exist. It has the same effect as the EXEC CICS... Read More
Name three ways the Modified Data Tag can be set on?
Added on Wed, Nov 25, 2009
The Modified Data Tag can be set on: 1. When the user enters data into the field. 2. When the application program moves DFHBMFSE to the attribute character. 3. By defining it in the BMS macro definition. Read More
How would you resolve an ASRA abend?
Added on Wed, Nov 25, 2009
In COBOL II start with CEBR, and get the offset/instruction Read More
What is the function of the Terminal Control table?
Added on Wed, Nov 25, 2009
To register all CICS terminals Read More
TSQs can be written in the Main storage or Auxiliary storage (True or False).?
Added on Thu, Nov 26, 2009
True Read More
what is difference between call and link ?
Added on Thu, Nov 26, 2009
In case of call , whenever you do changes to the called program you need to compile the calling program also. In case of link , it is not needed . Read More
What is meant by a CICS task ?
Added on Thu, Nov 26, 2009
A CICS task exists from the time the operator presses the enter key until the application program returns control to CICS. Read More
What is the common sytsems area (CSA) ?
Added on Thu, Nov 26, 2009
The common systems area is the major CICS control block that contains system information, including pointers to most other CICS control blocks. The CSA points to all members of STATIC storage. Read More
The map shown below is displayed with: ?
Added on Thu, Nov 26, 2009
EXEC CICS SEND MAP(’MAP1’) MAPSET(’MAP1S’) MAPONLY END-EXEC. After the screen is displayed, the operator enters 1 character, the letter ’X’. Where will the cursor now appear on the screen? MAP1S DFHMSD TYPE=MAP... Read More
What is an mdt (modified data tag) - it’s meaning and use ?
Added on Thu, Nov 26, 2009
The modified data tag is the last bit in the attribute byte for each screen field. It indicates whether the corresponding field has been changed. Read More
What is Quasi-reentrancy?
Added on Thu, Nov 26, 2009
There are times when many users are concurrently using the same program, this is what we call MultiThreading. For example, 50 users are using program A, CICS will provide 50 Working storage for that program but one Procedure Division. And this... Read More
What are attribute bytes and how and why are they modified ?
Added on Thu, Nov 26, 2009
Attribute bytes define map field characteristics (brightness, protection, etc); they are modified prior to issuing a SEND MAP command, eg. from normal to intense to highlight an error field. Read More
What option can be coded on the RETURN command to associate a transaction identifier with the next terminal input ?
Added on Thu, Nov 26, 2009
The TRANSID option. Read More
Once a transient data queue is read, can it be reread ?
Added on Thu, Nov 26, 2009
No, silly! That’s why IBM calls it transient. Read More
What other file control processing commands are used for file updating ?
Added on Thu, Nov 26, 2009
WRITE, REWRITE, DELETE and UNLOCK. Read More
What is the MASSINSERT option ?
Added on Thu, Nov 26, 2009
MASSINSERT is a WRITE option that modifies normal VSAM split processing, leaving free space after the inserted record, so subsequent records can be inserted without splits. It is ended by an UNLOCK command. Read More
What is the SQL Communications Area and what are some of its key fields ?
Added on Thu, Nov 26, 2009
It is a data structure that must be included in any host-language program using SQL. It is used to pass feedback about the sql operations to the program. Fields are return codes, error messages, handling codes and warnings. Read More
What is the significance of RDO ?
Added on Thu, Nov 26, 2009
RDO is Resource Definition Online. Since release 1.6 RDO allows resources (terminals, programs, transactions and files) to be defined interactively while CICS is running. Read More
What is CECI ?
Added on Thu, Nov 26, 2009
CECI is the command level interpreter tranid that interactively executes CICS commands. It is a rudimentary CICS command debugger which does not require coding an entire program. Read More
What is CEBR ?
Added on Thu, Nov 26, 2009
CEBR lets you browse the contents of a specific temporary storage queue. Read More
Name and explain some common CICS abend codes. ?
Added on Thu, Nov 26, 2009
Any AEI_ indicates an execute interface program problem - the abending program encountered an exceptional condition that was not anticipated by the coding. APCT - the program could not be found or is disabled. ASRA - most common CICS abend,... Read More
What are the CICS commands associated with temporary storage queue processing ?
Added on Thu, Nov 26, 2009
WRITEQ TS, READQ TS, and DELETEQ, whose meanings should be self-explanatory. Read More
What CICS command would you use to read a VSAM KSDS sequentially in ascending order ?
Added on Thu, Nov 26, 2009
READNEXT reads the next record from a browse operation for any of the three VSAM files. Read More
What is the CICS LOAD command ?
Added on Thu, Nov 26, 2009
The LOAD command retrieves an object program from disk and loads it into main storage - it’s primarily used for a constant table that will be available system-wide. . Read More
What are the six different types of argument values in COBOL that can be placed in various options of a CICS command?
Added on Thu, Nov 26, 2009
Data Value ? EX (Literal 8 or 77 KEYLEN PIC S9(4) COMP VALUE 8.) Data Area ? EX (01 RECORD-AREA. 05 FIELD1 PIC X(5). ) Pointer-Ref ? EX (05 POINTER-I PIC S9(8) COMP. ) Name ? EX (05 FILE-NAME PIC X(5) VALUE ?FILEA?. ) Label ? Cobol paragraph name... Read More
Specify the PIC clause for the following ?
Added on Thu, Nov 26, 2009
Any BLL Cell, Data type of Length Option field HHMMSS type of data fields Any BLL Cell ? S9(8) COMP Data type of Length Option field ? S9(4) COMP HHMMSS type of data fields ? S9(7) COMP3 Read More
List the sequence of steps used to achieve ?Modification in Skip Sequential Mode. ?
Added on Thu, Nov 26, 2009
READNEXT command Issue the ENDBR command Issue the READ command with UDTAE option. Manipulate the record (DELETE or REWRITE command) Issue START command Issue two READNEXT commands (One for dummy skip) Go to step two. Read More
What is the EIB parameter and the CICS command used to implement Pseudo-Conversational technique using single PCT ? Single PPT entry?
Added on Thu, Nov 26, 2009
EIBCALEN ? To check if COMMAREA has been passed in terurn command. EXEC CICS RETURN TRANSID(data-name) COMMAREA(data-area) LENGTH(data-value) END-EXEC Read More
Specify the CICS command used to read a VSAM record starting with prefix ?F?. Code all the relevant options?
Added on Thu, Nov 26, 2009
EXEC CICS READ DATASET(? FILENAME?) INTO(data-area) RIDFLD(data-area) KEYLENGTH(1) GENERIC LENGTH(WK-LEN) END-EXEC. Read More
How to establish a starting position in a browse operation?
Added on Thu, Nov 26, 2009
EXEC CICS STARTBR---------- END-EXEC. Read More
Which CICS service transaction is used to gain accessibility to CICS control tables Mention the one that has the highest priority. ?
Added on Thu, Nov 26, 2009
CEDA Read More
What CICS command do you need to obtain the user logon-id?
Added on Thu, Nov 26, 2009
You must code EXEC CICS ASSIGN with the OPERID option. Read More
What is EIB. How it can be used?
Added on Thu, Nov 26, 2009
CICS automatically provides some system-related information to each task in a form of EXEC Interface Block (EIB), which is unique to the CICS command level. We can use all the fields of EIB in our application programs right away. Read More
When a task suspends all the handle conditions via the PUSH command, how does the task reactivate all the handle conditions?
Added on Thu, Nov 26, 2009
By coding an EXEC CICS POP HANDLE command. Read More
Explain re-entrancy as applies to CICS?
Added on Thu, Nov 26, 2009
Reentrant program is a program which does not modify itself so that it can reenter to itself and continue processing after an interruption by the operating system which, during the interruption, executes other OS tasks including OS tasks of the... Read More
How is addressability achieved to the data outside programs working-storage.?
Added on Thu, Nov 26, 2009
The Base Locator for Linkage ( BLL ) is an addressing convention used to address storage outside the Working Storage Section of an application program. If BLL is used for the input commands (e.g.: READ, RECEIVE), it will improve the performance,... Read More
Explain the various ways data can be passed between CICS programs?
Added on Thu, Nov 26, 2009
Data can be passed between CICS programs in three ways- COMMAREA, TRASIENT DATA QUEUE & TEMPORARY STORAGE QUEUE. Data can be passed to a called program using the COMMAREA option of the LINK or XCTL command in a calling program. The called program... Read More
What is MDT?
Added on Thu, Nov 26, 2009
MDT ( Modified Data Tag ) is one bit of the attribute character. If it is off ( 0 ), it indicates that this field has not been modified by the terminal operator. If it is on ( 1 ), it indicates that this field has been modified by the operator. Only... Read More
What is the difference between getting the system time with EIBTIME and ASKTIME command?
Added on Thu, Nov 26, 2009
The ASKTIME command is used to request the current date and time. Whereas, the EIBTIME field have the value at the task initiation time. Read More
When an application is invoked via the EXEC CICS START command with the from option, how does the application gain access to the common area?
Added on Fri, Nov 27, 2009
An EXEC CICS RETRIEVE command will access the common area. Read More
Name the macros used to define the following:
Added on Fri, Nov 27, 2009
MAP MAPSET FIELD DFHMSD DFHMDI DFHMDF Read More
How do you define Task Work Area?
Added on Fri, Nov 27, 2009
By defining it on the PCT (the Program Control Table) Read More
How is the storage determined in the symbolic map, if you have multiple maps?
Added on Fri, Nov 27, 2009
Storage for maps redefine the first This means largest map has to be the first Read More
What are the steps you go through to a create a BMS executable?
Added on Fri, Nov 27, 2009
Assemble to create CSECT and Link Read More
.Explain the term Function Request Shipping?
Added on Fri, Nov 27, 2009
Function request shipping is one of the CICS modes of intercommunication which allows an application program in a local CICS to access resources owned by a remote CICS. Read More
List all the CICS tables and explain their contents?
Added on Fri, Nov 27, 2009
PPT SIT PCT JCT FCT SNT DCT SRT RCT TCT Read More
I have written a CICS program What tables should I setup to run this program?
Added on Fri, Nov 27, 2009
PPT, PCT, (FCT, DCT, RCT (if needed)) Read More
What are different system tables used in CICS?
Added on Fri, Nov 27, 2009
PCT, FCT, TCT, DCT, PPT PCT, FCT, TCT, DCT, PPT Read More
What is the content of the PPT entry?
Added on Fri, Nov 27, 2009
Length, Source, Use count, Lang, Res count DFHRPL number Read More
What is the difference between the enter key, the PF keys and the PA keys?
Added on Fri, Nov 27, 2009
The enter and PF keys transmit data from the screen; the PA keys tell CICS that a terminal action took place, but data is not transmitted. Read More
What do the terms locality of reference and working set mean?
Added on Fri, Nov 27, 2009
They refer to CICS efficiency techniques. Locality of reference requires that the application program should consistently reference instructions and data within a relatively small number of pages. The working set is the number of program pages... Read More
Why is it important not to execute a STOP RUN in CICS ?
Added on Fri, Nov 27, 2009
Stop run will come out from the CICS region. Read More
What are the VSAM files used in the CICS Programs?
Added on Fri, Nov 27, 2009
ESDS: Entry Sequenced Data Set KSDS: Key-Sequenced Data Set RRDS: Relative Record Data Set Read More
What are the commands available for browsing VSAM files? What is the sequence of coding these commands in the CICS programs?
Added on Fri, Nov 27, 2009
EXEC STARTBR .. EXEC CICS READ NEXT DATASET(name) INTO(data-area) RIDFLD (data-area-key) LENGTH(data-value) END-EXEC. EXEC ENDBR .. Read More
mapset consists of three maps and 10 fields on each map . How many of the following will be needed ?
Added on Fri, Nov 27, 2009
a) DFHMSD statements 1 b) DFHMDI statements 3 c) DFHMDF statements 30 Read More
How are programs reinitiated under CICS ?
Added on Fri, Nov 27, 2009
START COMMAND , RETURN COMMAND Read More
Why doesn?t CICS use the Cobol Open and Close statements ?
Added on Fri, Nov 27, 2009
CICS AUTOMATICALLY OPENS AND CLOSES THE FILES THOSE ARE PLASED IN FCT Read More
What are the macros used in coding the Maps?
Added on Fri, Nov 27, 2009
MAP ? DFHMSD MAPSET ? DFHMDI FIELD ? DFHMDF Read More
What are the CICS Commands used in routing messages to other terminals or printers?
Added on Fri, Nov 27, 2009
The ROUTE command establishes the messages routing environment but does not send message yet. The next SEND PAGE command (after the ROUTE) actually sends the message to the destinations. EXEC ROUTE LIST(data-area) OPCLASS(data-area) INTERVAL(hhmmss)... Read More
What are all the differences between the TDQ & TSQ?
Added on Fri, Nov 27, 2009
CICS Interview Questions and Answers,CICS Faqs,CICS Interview FAQs and CICS Books,CICS interview ebook,CICS teCICShniCICSal interview questions,CICS Quiz,CICS Interview Paper,CICS PlaCICSement Papers,CICS Interview ProCICSedure,CICS Aptitude... Read More
What command is used for committing the data and how it is coded?
Added on Fri, Nov 27, 2009
SYNCPOINT. EXEC CICS SYNC POINT END-EXEC Read More
What is the attribute byte?
Added on Fri, Nov 27, 2009
Defines the display/transmission of field. most cases is an output field from the program. Read More
What is the Master Terminal transaction?
Added on Fri, Nov 27, 2009
CEMT is a CICS supplied transaction which manipulates the CICS environment, such as transactions, programs, files, TSQ?S and tasks. CEMT SET ? To update the status of CICS environments CEMT INQUIRE ? To inquire about the status of CICS environment... Read More
What are the standard copy libraries available for CICS-COBOL programs? Which of these can be copied to working storage section and with which command?
Added on Fri, Nov 27, 2009
DFHEIBLK and DFHBMSCA. Using COPY stmt we need include DFHBMSCA in working storage Read More
What are the various types of accesses that can be allowed by the SERVREQ option of the DFHFCT?
Added on Fri, Nov 27, 2009
ADD,BROWSE,DELETE,READ,UPDATE Read More
Which is the AID that will not be identified in the ANYKEY option of the HANDLE AID command?
Added on Fri, Nov 27, 2009
Clear Read More
Which of the following commands, when issued by 2 different programs running at the same time, will prevent simultaneous use of resource ’SINGLE’?
Added on Fri, Nov 27, 2009
A) EXEC CICS PROTECT RESOURCE(’SINGLE’) LENGTH(6) END-EXEC. B) EXEC CICS HOLD RESOURCE(’SINGLE’) LENGTH(6) END-EXEC. C) EXEC CICS TASK SINGLE(’SINGLE’) LENGTH(6) END-EXEC. D) EXEC CICS EXCLUSIVE RESOURCE(&rsquo... Read More
The map shown below is displayed with: EXEC CICS SEND MAP(’MAP1’) MAPSET(’MAP1S’) MAPONLY END-EXEC.After the screen is displayed, the operator enters 1 character, the letter ’X’.Where will the cursor now appear on
Added on Fri, Nov 27, 2009
MAP1S DFHMSD TYPE=MAP,MODE=INOUT,CTRL=(FREEKB,FRSET),LANG=COBOL, X TIOAPFX=YESMAP1 DFHMDI SIZE=(24,80) DFHMDF POS=(5,1),ATTRB=UNPROT,LENGTH=1FIELD2 DFHMDF POS=(5,3),ATTRB=UNPROT,LENGTH=1FIELD3 DFHMDF POS=(5,5),ATTRB=(UNPROT,IC),LENGTH=1FIELD4 DFHMDF... Read More
What is the CICS command that is used to receive the un-formatted data from the terminal or logical unit of a communication network?
Added on Fri, Nov 27, 2009
RECEIVE Read More
What is the command for reading a record form a TSQ?
Added on Fri, Nov 27, 2009
READQ TS, READQ Read More
Which is the control table where you specify all the transaction that are to be started by CICS after CICS start-up?
Added on Fri, Nov 27, 2009
Sign-on table Read More
A HANDLE CONDITION remains active until the end of the program or until another HANDLE CONDITION command (True or False) ?
Added on Fri, Nov 27, 2009
True Read More
What is a two Phase commit in CICS?
Added on Fri, Nov 27, 2009
This occurs when a programmer Issues a Exec CICS Syncpoint command. this is called two phase because CICS will first commit changes to the resources under its control like VSAM files. and the DB2 changes are committed.Usually CICS signals DB2 to... Read More
The goal of a recovery process is to Maintain the integrity of the data processed by the system and to minimize the impact of a task or system failure (True or False). ?
Added on Fri, Nov 27, 2009
True Read More
Difference between TSQ & TDQ?
Added on Fri, Nov 27, 2009
TDQ is read destructive, TSQ is not. TSQ can be created dynamically, TDQ cannot be created dynamically. TSQ is temporary in nature (i:e it will be deleted when the program finishes execution, unless it is made permanent by making a entry in the... Read More
What is the CICS supplied transaction which performs syntax checking of a CICS command?
Added on Fri, Nov 27, 2009
CEMT Read More
What does EIB mean?
Added on Fri, Nov 27, 2009
The EIB is the EXECUTIVE INTERFACE BLOCK. It is not the EXECUTE INTERFACE BLOCK. All TP monitors or transaction processors are know as EXECUTIVEs as they carry out process on behalf of a program module. CICS and DB2 are excutives. Read More
What is the process of converting the CICS commands into the equivalent host language statements called?
Added on Fri, Nov 27, 2009
Translation Read More
What is the function of the LOAD command?
Added on Fri, Nov 27, 2009
To fetch a program, table or map to the main storage. THE " LOAD " COMMAND IS USED TO LOAD A PROGRAM OR A TABLE WHICH IS INDEPENDENTLY COMPILED OR ASSEMBLED , LINEDITED AND REGISTERED IN PPT . THIS IS USEFUL FOR LOADING A TABLE DYNAMICALLY. THAT... Read More
What is the CICS Command that is used for reading a record from the TDQ?
Added on Fri, Nov 27, 2009
READQ Read More
What is the command used for receiving a map from a terminal?
Added on Fri, Nov 27, 2009
RECEIVE MAP Read More
What is the difference between the XCTL and LINK commands?
Added on Wed, Nov 25, 2009
The LINK command anticipates return of control to the calling program, the XCTL command does not. Return to the calling program will be the result of the CICS RETURN command, specifying TRANSID(name of the calling program). Read More
LENGERR, NOTAUTH and PGMIDERR are some of the common exception conditions that can occur with LINK and XCTL
Added on Wed, Nov 25, 2009
False Read More
What is the meaning and use of the EIBAID field ?
Added on Wed, Nov 25, 2009
EIBAID is a key field in the execute interface block; it indicates which attention key the user pressed to initiate the task. Read More
What is the difference between pseudo-conversational and conversational?
Added on Wed, Nov 25, 2009
Pseudo-conversational will start a new task for each input. By coding a CICS RETURN command specifying ? TRANSID(itself). Conversational will have an active task during the duration of the data entry. In a conversational mode, the... Read More
What is some of the information available in the EIB area?
Added on Wed, Nov 25, 2009
The cursor position in the map Transaction ID Terminal ID Task Number Length of communication area Current date and time Attention identifier Read More
What is Journal Recovery and Dynamic Transaction Backout ?
Added on Wed, Nov 25, 2009
Journal Recovery is recovery of changes made to a file during online processing. If a file has I/O problems it is restored from a backup taken before online processing began and the journalled changes are applied. Dynamic transaction backout is the... Read More
What is the difference between the enter key, the PF keys and the PA keys ?
Added on Thu, Nov 26, 2009
The enter and PF keys transmit data from the screen; the PA keys tell CICS that a terminal action took place, but data is not transmitted. Read More
What is temporary storage ?
Added on Thu, Nov 26, 2009
Temporary storage is either main or auxiliary storage that allows the program to save data between task invocations. Read More
What is task control and what are the CICS commands associated with it ?
Added on Thu, Nov 26, 2009
Task control refers to the CICS functions that manage the execution of tasks. (Elementary, my dear Watson!) Task control commands are SUSPEND, ENQ, and DEQ Read More
Mention the 5 fields available in the symbolic map for every ?NAMED? field in the DFHMDI macro?
Added on Thu, Nov 26, 2009
FIELD+L - Return the length of text entered (or for dymanic cursor positioing) FIELD+F - Returns X(80) if data entered but erased. FIELD+A - Used for attributes reading and setting FIELD+I - Used for reading the text entered while receiving the map... Read More
Explain the means of supporting pseudo conversation programming. (E.g. Storing and restoring of states, control flow, error handling)?
Added on Thu, Nov 26, 2009
When we send a map using SEND MAP command. Immediately we release the program by using EXEC CICS RETURN command. In this command we mention the TRANSACTION ID which is to be executed after receiving the map. In this command we also specify the data... Read More
What is the purpose of the Program List Table?
Added on Thu, Nov 26, 2009
The Program List Table records the set of applications programs that will be executed automatically at CICS start-up time. Read More
What is the function of the Terminal Control Table(TCT)?
Added on Thu, Nov 26, 2009
The TCT defines the characteristics of each terminal with which CICS can communicate. Read More
What is effect on RECEIVE MAP when
Added on Fri, Nov 27, 2009
PF key is pressed? Data transmission may happen, PA key is pressed? Data transmission will not happen Read More
which CICS defined field can you determine the position of the cursor on the map ?
Added on Fri, Nov 27, 2009
ATTRIB FIELD Read More
For multithreading an application program need not be re-entrant(True or False).?
Added on Fri, Nov 27, 2009
True Read More
what is ASRA,How to resolve it
Added on Fri, Nov 27, 2009
ASRA is like SOC7, SOC4 etc. In COBOL II start with CEBR, and get the offset/instruction. Read More
How do you access the records randomly in TSQ ?
Added on Fri, Nov 27, 2009
By specifying the ITEM option Read More
The mode of achieving conversation with the user, by sending him the message and while waiting for his response, freeing the system resources is called?
Added on Fri, Nov 27, 2009
Pseudo-conversation Read More
Question : What command do you issue to delete a record in a transient data queue ? Category CICS Interview Questions Rating (0.0) By 0 users Added on 3/1/2008 Views 123 Rate it!
Added on Fri, Nov 27, 2009
READQ TD, the read is destructive. Yes it is correct but there is a restriction. You Can delete the records sequentially. For example if one want to delete 10th record directly it is not possible with this. Read More

No comments:

Post a Comment